Search Results - (( developing user classification algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Various classification algorithms have been developed to produce classification models with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A... by Hamsani, Aqil Khairy, Mohd Bahrin, Ummu Fatihah, Wan Abdul Manan, Wan Dorishah

    Published 2023
    “…This study has successfully achieved its objectives in creating a working Google Play application classification program. The classifier’s accuracy and user-friendly interface make it a valuable tool for developers and users.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Development of interactive application for classification of Artocarpus Species by Abdul Ghapar, Nadia

    Published 2020
    “…This study capable to provide the results for current accuracy data representation of the selected Artocarpus species. The development of Graphical User Interface (GUI) for classification of Artocarpus species help user to identify and differentiate the species in faster and easier way especially botanist, taxonomist, and researcher. …”
    Get full text
    Undergraduate Final Project Report
  8. 8

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
    Get full text
    Get full text
    Article
  9. 9

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…This study highlights the need for better tools to handle complex user reviews. Investigating the potential of emerging machine learning models and algorithms to improve classification and prioritization accuracy is crucial. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
    Proceedings Paper
  11. 11
  12. 12

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Future development can be carried out by creating a database based on the user’s standard of measure and accessing it whenever the user starts the program.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Identify texture of MRI human brain using Adaptive Fuzzy C-Means (AFCM) Algorithm / Faridatul Akma Mohd Noor by Faridatul Akma, Mohd Noor

    Published 2010
    “…The result of this research can be uses for segmentation and classification process. To access its viability, a prototype with interactive graphical user interface (GUI) was developed and tested for its reliability. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Sentiment analysis of hotel reviews using Convolutional Neural Network / Sofea Aini Mohd Sufian by Mohd Sufian, Sofea Aini

    Published 2021
    “…So, the aim of this paper is to develop a prototype for hotel reviews using CNN Algorithm, to identify the requirements of CNN technique for text classification and also to evaluate the accuracy of CNN algorithm. …”
    Get full text
    Get full text
    Thesis